<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-davies-internal-tld-04" category="info" submissionType="independent" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Private use top-level domain">A Top-level Domain for Private Use</title>

    <author initials="K." surname="Davies" fullname="Kim Davies">
      <organization abbrev="IANA">Internet Assigned Numbers Authority</organization>
      <address>
        <email>kim.davies@iana.org</email>
      </address>
    </author>
    <author initials="A." surname="McConachie" fullname="Andrew McConachie">
      <organization abbrev="ICANN">Internet Corporation for Assigned Names and Numbers</organization>
      <address>
        <email>andrew.mcconachie@icann.org</email>
      </address>
    </author>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>

    <date year="2025" month="July" day="02"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 53?>

<t>This document describes the "internal" top-level domain for use in
private applications.</t>



    </abstract>



  </front>

  <middle>


<?line 58?>

<section anchor="introduction"><name>Introduction</name>

<t>There are certain circumstances in which private network operators may
wish to use their own domain naming scheme that is not intended to be
used or accessible by the global domain name system (DNS), such as
within closed corporate or home networks.</t>

<t>The "internal" top-level domain provides this purpose in the DNS. Such
domains will not resolve in the global DNS, but can be configured within
closed networks as the network operator sees fit. It fulfils a similar
purpose as private-use IP address ranges that are set aside (e.g.
<xref target="RFC1918"/>).</t>

</section>
<section anchor="using-the-internal-namespace"><name>Using the "internal" Namespace</name>

<t>Network operators have been using different names for private-use
DNS for many years. This usage has been uncoordinated and can result
in incompatibilities or harm to Internet users. For example, an
organization might choose to use a name for this purpose that has not
been assigned to them, that would later appear in the global DNS thereby
causing name collisions and undefined behavior for users.</t>

<t>If an organization determines that it requires a private-use DNS
namespace, it should either use sub-domains of a global DNS name that is
under its organizational and operational control, or use the "internal"
top-level domain. This document does not offer guidance on when a
network operators should choose the "internal" top-level domain instead
of a sub-domain of a global DNS name. This decision will depend on
multiple factors such as network design or organizational needs, and is
outside the scope of this publication.</t>

<t>DNSSEC validating resolvers relying on the global DNS trust anchor will
fail to resolve names ending in "internal".</t>

</section>
<section anchor="comparisons-to-similar-namespaces"><name>Comparisons to Similar Namespaces</name>

<t>Other namespaces are reserved for similar purposes, which superficially
may seem to serve the same purpose as the "internal" domain, but are
intended for different use cases.</t>

<t><list style="symbols">
  <t>The "local" namespace <xref target="RFC6762"/> is reserved for use with the
multicast DNS protocol. This protocol allows for resolution between
devices on a local network. This namespace does not use typical DNS
zones for name allocation, and instead uses the multicast DNS protocol
to negotiate names and resolve conflicts. It is expected "internal" will
be used for applications where names are specified in locally-configured
zones.</t>
  <t>The "alt" namespace <xref target="RFC9476"/> is reserved for contexts where
identifiers are used that may look like domain names, but do not use
the DNS protocol for resolution. This is in contrast to the "internal"
domain which is to be used with the DNS protocol, but in limited
private-use network scope.</t>
  <t>The "home.arpa" namespace <xref target="RFC8375"/> is reserved for use within
residential networks, including with the Home Networking Control Protocol
<xref target="RFC7788"/>.</t>
</list></t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>The document requires no IANA actions. For the reasons stated above,
the "internal" top-level domain is reserved from being used in the
global DNS.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>While the namespace is designated for private use, there is no guarantee
that the names utilized in this namespace will not leak into the broader
Internet. Since usage may appear in log files, email headers, and the
like; users should not rely on the confidentiality of the "internal"
namespace.</t>

<t>Users should not expect that names in the "internal" namespace are
globally unique; it is assumed that many of the same names will be used
for entirely different purposes on different networks. This is similar
to the use of the "local" namespace in the multicast DNS protocol - just
as there are many different devices named "printer.local", there may
be many different servers named "accounting.internal". Users should be
aware of this when performing operations requiring authenticity, such as
entering credentials.</t>

<t>Users should also not assume the appearance of such names is indicative
of the true source of transmissions. When diagnosing network issues, the
appearance of such addresses must be interpreted with the associated
context to ascertain the private network with which the name is being
used. A name within the "internal" namespace can never be used by itself
to identify the origin of a communication.</t>

<t>The lack of global uniqueness also has implications for HTTP cookies;
a cookie set for "accounting.internal" on one network may be sent to a
different "accounting.internal" if the user changes their local network.
This may be mitigated by adding the Secure flag to the cookie. It is
expected that Certificate Authorities will not issue certificates for
the "internal" namespace as it does not resolve in the global DNS. If an
organization wants to use HTTP over TLS with names in the "internal"
namespace, they will also need an internal, private CA. The details of
this are outside the scope of this document.</t>

</section>
<section anchor="additional-information"><name>Additional Information</name>

<t>This reservation is the result of a community deliberation on this
topic over many years, most notably <xref target="SAC113"/>. The SAC113 advisory
recommended the establishment of a single top-level domain for
private-use applications. DNS records within this top-level domain
will not be resolvable in contexts outside of a private network.</t>

<t>A selection process <xref target="IANA-Assessment"/> determined "internal" was
the best suited string given the requirement that a single string be
selected for this purpose, and subsequently reserved for this purpose in
July 2024. <xref target="ICANN-Board-Resolution"/></t>

</section>


  </middle>

  <back>




    <references title='Informative References' anchor="sec-informative-references">



<referencegroup anchor="BCP14" target="https://www.rfc-editor.org/info/bcp14">
  <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
    <front>
      <title>Key words for use in RFCs to Indicate Requirement Levels</title>
      <author fullname="S. Bradner" initials="S." surname="Bradner"/>
      <date month="March" year="1997"/>
      <abstract>
        <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
      </abstract>
    </front>
    <seriesInfo name="BCP" value="14"/>
    <seriesInfo name="RFC" value="2119"/>
    <seriesInfo name="DOI" value="10.17487/RFC2119"/>
  </reference>
  <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
    <front>
      <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
      <author fullname="B. Leiba" initials="B." surname="Leiba"/>
      <date month="May" year="2017"/>
      <abstract>
        <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
      </abstract>
    </front>
    <seriesInfo name="BCP" value="14"/>
    <seriesInfo name="RFC" value="8174"/>
    <seriesInfo name="DOI" value="10.17487/RFC8174"/>
  </reference>
</referencegroup>

<referencegroup anchor="BCP219" target="https://www.rfc-editor.org/info/bcp219">
  <reference anchor="RFC9499" target="https://www.rfc-editor.org/info/rfc9499">
    <front>
      <title>DNS Terminology</title>
      <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
      <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
      <date month="March" year="2024"/>
      <abstract>
        <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
        <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
      </abstract>
    </front>
    <seriesInfo name="BCP" value="219"/>
    <seriesInfo name="RFC" value="9499"/>
    <seriesInfo name="DOI" value="10.17487/RFC9499"/>
  </reference>
</referencegroup>

<reference anchor="RFC1918">
  <front>
    <title>Address Allocation for Private Internets</title>
    <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
    <author fullname="B. Moskowitz" initials="B." surname="Moskowitz"/>
    <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
    <author fullname="G. J. de Groot" initials="G. J." surname="de Groot"/>
    <author fullname="E. Lear" initials="E." surname="Lear"/>
    <date month="February" year="1996"/>
    <abstract>
      <t>This document describes address allocation for private internets. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="5"/>
  <seriesInfo name="RFC" value="1918"/>
  <seriesInfo name="DOI" value="10.17487/RFC1918"/>
</reference>

<reference anchor="RFC6761">
  <front>
    <title>Special-Use Domain Names</title>
    <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
    <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
    <date month="February" year="2013"/>
    <abstract>
      <t>This document describes what it means to say that a Domain Name (DNS name) is reserved for special use, when reserving such a name is appropriate, and the procedure for doing so. It establishes an IANA registry for such domain names, and seeds it with entries for some of the already established special domain names.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6761"/>
  <seriesInfo name="DOI" value="10.17487/RFC6761"/>
</reference>

<reference anchor="RFC6762">
  <front>
    <title>Multicast DNS</title>
    <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
    <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
    <date month="February" year="2013"/>
    <abstract>
      <t>As networked devices become smaller, more portable, and more ubiquitous, the ability to operate with less configured infrastructure is increasingly important. In particular, the ability to look up DNS resource record data types (including, but not limited to, host names) in the absence of a conventional managed DNS server is useful.</t>
      <t>Multicast DNS (mDNS) provides the ability to perform DNS-like operations on the local link in the absence of any conventional Unicast DNS server. In addition, Multicast DNS designates a portion of the DNS namespace to be free for local use, without the need to pay any annual fee, and without the need to set up delegations or otherwise configure a conventional DNS server to answer for those names.</t>
      <t>The primary benefits of Multicast DNS names are that (i) they require little or no administration or configuration to set them up, (ii) they work when no infrastructure is present, and (iii) they work during infrastructure failures.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6762"/>
  <seriesInfo name="DOI" value="10.17487/RFC6762"/>
</reference>

<reference anchor="RFC7788">
  <front>
    <title>Home Networking Control Protocol</title>
    <author fullname="M. Stenberg" initials="M." surname="Stenberg"/>
    <author fullname="S. Barth" initials="S." surname="Barth"/>
    <author fullname="P. Pfister" initials="P." surname="Pfister"/>
    <date month="April" year="2016"/>
    <abstract>
      <t>This document describes the Home Networking Control Protocol (HNCP), an extensible configuration protocol, and a set of requirements for home network devices. HNCP is described as a profile of and extension to the Distributed Node Consensus Protocol (DNCP). HNCP enables discovery of network borders, automated configuration of addresses, name resolution, service discovery, and the use of any routing protocol that supports routing based on both the source and destination address.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7788"/>
  <seriesInfo name="DOI" value="10.17487/RFC7788"/>
</reference>

<reference anchor="RFC8375">
  <front>
    <title>Special-Use Domain 'home.arpa.'</title>
    <author fullname="P. Pfister" initials="P." surname="Pfister"/>
    <author fullname="T. Lemon" initials="T." surname="Lemon"/>
    <date month="May" year="2018"/>
    <abstract>
      <t>This document specifies the behavior that is expected from the Domain Name System with regard to DNS queries for names ending with '.home.arpa.' and designates this domain as a special-use domain name. 'home.arpa.' is designated for non-unique use in residential home networks. The Home Networking Control Protocol (HNCP) is updated to use the 'home.arpa.' domain instead of '.home'.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8375"/>
  <seriesInfo name="DOI" value="10.17487/RFC8375"/>
</reference>

<reference anchor="RFC9476">
  <front>
    <title>The .alt Special-Use Top-Level Domain</title>
    <author fullname="W. Kumari" initials="W." surname="Kumari"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>This document reserves a Top-Level Domain (TLD) label "alt" to be used in non-DNS contexts. It also provides advice and guidance to developers creating alternative namespaces.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9476"/>
  <seriesInfo name="DOI" value="10.17487/RFC9476"/>
</reference>


<reference anchor="SAC113" target="https://itp.cdn.icann.org/en/files/security-and-stability-advisory-committee-ssac-reports/sac-113-en.pdf">
  <front>
    <title>SSAC Advisory on Private-Use TLDs</title>
    <author >
      <organization></organization>
    </author>
    <date year="2020" month="September"/>
  </front>
</reference>
<reference anchor="IANA-Assessment" target="https://itp.cdn.icann.org/en/files/root-system/identification-tld-private-use-24-01-2024-en.pdf">
  <front>
    <title>Identification of a top-level domain for private use</title>
    <author >
      <organization></organization>
    </author>
    <date year="2024" month="January"/>
  </front>
</reference>
<reference anchor="ICANN-Board-Resolution" target="https://www.icann.org/en/board-activities-and-meetings/materials/approved-resolutions-special-meeting-of-the-icann-board-29-07-2024-en#section2.a">
  <front>
    <title>Reserving .INTERNAL for Private-Use Applications</title>
    <author >
      <organization></organization>
    </author>
    <date year="2024" month="July"/>
  </front>
</reference>


    </references>



<?line 171?>

<section numbered="false" anchor="notes-for-removal-before-publication"><name>Notes (for removal before publication)</name>

<t><list style="symbols">
  <t>I-D source is maintained at: <eref target="https://github.com/kjd/draft-davies-internal-tld">https://github.com/kjd/draft-davies-internal-tld</eref></t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

